]> git.ipfire.org Git - thirdparty/libarchive.git/commit
Zip reader: Guard against 64-bit overflow for file sizes and offsets
authorTim Kientzle <kientzle@acm.org>
Sun, 12 Feb 2017 20:39:45 +0000 (12:39 -0800)
committerTim Kientzle <kientzle@acm.org>
Sun, 12 Feb 2017 20:41:52 +0000 (12:41 -0800)
commite00010d4dc1723cead7272b136ec5d2f4ec062e7
tree10afb05145ddfeda44a1ec5f6a80b239822eebc0
parentb3bd0b81a1a06909f766dea8be4072ef81de62b8
Zip reader:  Guard against 64-bit overflow for file sizes and offsets

We use `uint64_t` consistently when parsing values from the archive
but then assign them to `int64_t` variables.  This can result in
nonsensical negative file sizes or offsets in some cases.

Reported-By: OSS-Fuzz issue 556
libarchive/archive_read_support_format_zip.c